AUSTIN, Texas--July 5, 2006--Mirage Networks, developers of award-winning endpoint control solutions that combine network access control with policy enforcement and day-zero threat protection, today announced that Thomas M. Cooley Law School has chosen Mirage Networks solutions to secure its network interior.

Institutions of higher learning have to meet what often seem like diametrically opposed goals: ensuring that the network is available and easily accessible, while preventing hacker break-ins and infection spread. And universities are currently under the spotlight, with high-profile hacks at schools across the globe putting hundreds of thousands of students and alumni in danger of becoming identity fraud victims.

"To say it's challenging is understating the severity of the problem. We needed a way to ensure that Thomas Cooley would not fall victim to attacks like those experienced by other universities," said Jason Rahl, Network Analyst of Thomas M. Cooley Law School. "We have to enable network access to student-owned IP devices, and after testing different solutions we found that Mirage Networks delivers what we were looking for: the ability to make sure even unmanaged devices are complying with our security policy and are infection-free."

"Our customers, like Thomas Cooley, require network security that doesn't force them to change their infrastructures or ways of doing business," said Matt Hendrickson, Senior System Engineer of RJ Networking. "With Mirage, we can offer a solution that helps them control who gets and retains access to network resources, works with in-place technologies and doesn't add the burden of updating agents or signatures. It's an ideal complement to their security, as well as to the rest of our product portfolio."

Mirage's easy to deploy, easy to manage, appliance-based technology:

Ensures policy enforcement and threat termination from the moment any device enters the network

Works with current IT and networking infrastructure and leverages investments in tested security solutions

Is effective without agents to manage on thousands of device types

Covers all OSs and IP devices, from Windows desktops to Cisco IP phones to Linux PDAs and beyond

Catches day-zero threats out of the box and without signatures

Mirage solutions use behavioral rules to detect when devices are either spreading threats or violating policies, even if the threat is a new one, and patches are either unavailable or not yet installed. It then surgically isolates the device in question, avoiding cross-infection while enabling remediation, before allowing the device renewed access to network resources. In so doing, it stops damage from threats introduced onto the network by mobile computing, remote connections, and day-zero malware -- complementing perimeter security solutions and giving companies a more complete, in-depth security defense infrastructure.

"Mirage Endpoint Control represents a new approach to endpoint control that focuses on the area that's most vulnerable: the network interior. Combined with RJ Networking's market expertise, it is the optimal solution for end-customers to mitigate today's network threats," said Greg Stock, senior vice president of worldwide sales and marketing, Mirage Networks. "The network interior is where the battle is -- and Mirage Endpoint Control's ability to secure it is unmatched."

About Mirage Networks
Mirage Networks is committed to defending the network interior with the industry's easiest to implement network security solutions. Delivered through a global channel of VARs, SIs, OEMs and MSSPs, the company's patent-pending technology gives IT managers control in the uncontrollable environment of infected, unmanaged and out-of-policy devices. Its appliance-based approach deploys out of band, and requires neither signatures nor agents to terminate day-zero threats and enforce policies, while ensuring a positive user experience. Delivering security from the moment any device enters the network, Mirage solutions provide powerful answers to the problems of securing networks with heterogeneous infrastructures and fluid perimeters. Based in Austin, Texas, Mirage Networks is a consistent winner of industry awards and recognition. Learn more at www.miragenetworks.com.

Use of this site is governed by our Terms of Use and Privacy Policy.
Copyright 1996- Ziff Davis, LLC. All Rights Reserved.
Reproduction in whole or in part in any form or medium without express written permission
of Ziff Davis, LLC. is prohibited.PCMag Digital GroupAdChoice